<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://secai.baremetalcyber.com/</loc>
    <lastmod>2026-04-22T03:07:45Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes</loc>
    <lastmod>2026-04-22T03:07:45Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-04-22T03:07:45Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/recommended</loc>
    <lastmod>2026-04-22T03:07:45Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/baremetalcyber</loc>
    <lastmod>2026-04-22T03:07:45Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/course-hub</loc>
    <lastmod>2026-04-22T03:07:45Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/study-guide</loc>
    <lastmod>2026-04-22T03:07:45Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/flash-cards</loc>
    <lastmod>2026-04-22T03:07:45Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-04-22T03:07:45Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-90-prevent-shadow-ai-sanctioned-tools-usage-rules-and-enforcement-patterns</loc>
    <lastmod>2026-03-29T18:24:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-89-apply-responsible-ai-principles-fairness-transparency-and-explainability-choices</loc>
    <lastmod>2026-03-29T18:24:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-88-define-ai-security-responsibilities-owners-approvers-builders-and-auditors</loc>
    <lastmod>2026-03-29T18:24:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-87-build-ai-governance-structures-policies-roles-and-a-working-operating-model</loc>
    <lastmod>2026-03-29T18:24:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-86-manage-ci-cd-with-ai-assistants-secure-pipelines-tests-and-change-control</loc>
    <lastmod>2026-03-29T18:23:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-85-apply-safe-automation-low-code-workflows-with-guardrails-and-auditability</loc>
    <lastmod>2026-03-29T18:23:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-84-recognize-ai-assisted-malware-evolution-obfuscation-mutation-and-detection-gaps</loc>
    <lastmod>2026-03-29T18:23:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-83-track-ai-accelerated-recon-target-discovery-enumeration-and-defensive-signals</loc>
    <lastmod>2026-03-29T18:23:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-82-counter-ai-scaled-social-engineering-phishing-vishing-and-pretext-detection</loc>
    <lastmod>2026-03-29T18:23:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-81-understand-ai-driven-deepfakes-impersonation-risk-and-verification-countermeasures</loc>
    <lastmod>2026-03-29T18:23:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-80-use-ai-for-threat-intel-entity-extraction-clustering-and-confidence-handling</loc>
    <lastmod>2026-03-29T18:23:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-79-use-ai-for-incident-triage-summaries-prioritization-and-evidence-integrity</loc>
    <lastmod>2026-03-29T18:22:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-78-use-ai-for-detection-engineering-rules-correlation-and-noise-reduction</loc>
    <lastmod>2026-03-29T18:22:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-77-use-ai-for-code-review-linting-sast-triage-and-false-positive-control</loc>
    <lastmod>2026-03-29T18:22:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-76-use-ai-in-secure-coding-generating-code-without-injecting-vulnerabilities</loc>
    <lastmod>2026-03-29T18:22:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-75-reduce-overreliance-risk-human-verification-loops-and-safe-escalation-rules</loc>
    <lastmod>2026-03-29T18:13:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-74-secure-integrations-and-plug-ins-trust-boundaries-validation-and-least-privilege</loc>
    <lastmod>2026-03-29T18:12:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-73-handle-denial-of-service-risks-model-dos-cost-bombs-and-resilience</loc>
    <lastmod>2026-03-29T18:12:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-72-prevent-model-theft-extraction-risks-query-limits-and-watermark-strategies</loc>
    <lastmod>2026-03-29T18:12:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-71-analyze-membership-inference-risks-privacy-exposure-and-defensive-techniques</loc>
    <lastmod>2026-03-29T18:12:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-70-analyze-model-inversion-risks-what-can-leak-and-how-to-reduce-it</loc>
    <lastmod>2026-03-29T18:12:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-69-investigate-model-poisoning-artifact-integrity-supply-chain-and-remediation</loc>
    <lastmod>2026-03-29T18:12:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-68-investigate-data-poisoning-detection-clues-impact-analysis-and-recovery-steps</loc>
    <lastmod>2026-03-29T18:12:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-67-defend-against-jailbreaking-common-tactics-and-practical-mitigations</loc>
    <lastmod>2026-03-29T18:11:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-66-detect-prompt-injection-attempts-indicators-triage-and-containment-options</loc>
    <lastmod>2026-03-29T18:11:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-65-interpret-confidence-signals-limits-miscalibration-and-operational-risk</loc>
    <lastmod>2026-03-29T18:11:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-64-audit-ai-use-at-scale-who-asked-what-when-and-with-what-data</loc>
    <lastmod>2026-03-29T18:11:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-63-log-ai-interactions-safely-sanitization-redaction-and-tamper-resistance</loc>
    <lastmod>2026-03-29T18:11:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-62-monitor-prompts-as-telemetry-signals-patterns-and-threat-hunting-hooks</loc>
    <lastmod>2026-03-29T18:11:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-61-apply-key-management-right-rotation-storage-and-separation-of-duties</loc>
    <lastmod>2026-03-29T18:11:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-60-apply-access-controls-across-layers-data-models-tools-and-agents</loc>
    <lastmod>2026-03-29T18:10:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-59-lock-down-endpoints-network-controls-segmentation-and-service-hardening</loc>
    <lastmod>2026-03-29T18:10:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-58-secure-agent-toolchains-least-privilege-scoped-credentials-and-audit-trails</loc>
    <lastmod>2026-03-29T18:10:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-57-control-outputs-safely-dangerous-content-filters-and-secure-output-encoding</loc>
    <lastmod>2026-03-29T18:10:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-56-validate-inputs-rigorously-file-types-length-limits-and-content-sanitization</loc>
    <lastmod>2026-03-29T18:10:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-55-set-rate-limits-and-quotas-token-caps-cost-controls-and-abuse-prevention</loc>
    <lastmod>2026-03-29T17:58:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-54-build-prompt-firewalls-filtering-classification-and-instruction-boundary-checks</loc>
    <lastmod>2026-03-29T17:58:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-53-implement-guardrails-that-hold-policy-rules-validators-and-refusal-logic</loc>
    <lastmod>2026-03-29T18:02:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-52-model-the-attack-surface-data-model-agent-tooling-and-integrations</loc>
    <lastmod>2026-03-29T18:02:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-51-track-ai-vulnerabilities-cve-workflows-advisories-and-exposure-management</loc>
    <lastmod>2026-03-29T18:02:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-50-use-mitre-atlas-concepts-for-ai-threat-modeling-and-adversary-behavior</loc>
    <lastmod>2026-03-29T18:02:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-49-apply-owasp-guidance-to-ml-risks-abuse-patterns-and-defensive-responses</loc>
    <lastmod>2026-03-29T18:01:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-48-apply-owasp-guidance-to-llm-risks-top-threats-and-key-controls</loc>
    <lastmod>2026-03-29T18:01:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-47-operate-feedback-loops-safely-user-inputs-reinforcement-and-toxic-drift</loc>
    <lastmod>2026-03-29T18:01:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-46-build-human-oversight-that-works-reviews-approvals-and-accountability-points</loc>
    <lastmod>2026-03-29T18:01:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-45-plan-secure-maintenance-patch-strategy-versioning-and-rollback-discipline</loc>
    <lastmod>2026-03-29T18:01:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-44-control-model-exposure-endpoints-apis-authentication-and-authorization-choices</loc>
    <lastmod>2026-03-29T18:01:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-43-design-secure-deployment-paths-environments-isolation-and-integration-boundaries</loc>
    <lastmod>2026-03-29T18:01:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-42-evaluate-models-for-abuse-misuse-paths-safety-gaps-and-overreach-risks</loc>
    <lastmod>2026-03-29T18:00:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-41-select-models-securely-capability-fit-failure-modes-and-vendor-transparency</loc>
    <lastmod>2026-03-29T18:00:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-40-translate-requirements-into-controls-security-privacy-and-reliability-criteria</loc>
    <lastmod>2026-03-29T18:00:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-39-anchor-ai-security-to-business-objectives-use-case-scope-and-risk-appetite</loc>
    <lastmod>2026-03-29T18:00:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-38-enforce-data-access-boundaries-rbac-abac-and-purpose-based-controls</loc>
    <lastmod>2026-03-29T18:00:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-37-manage-data-retention-deletion-forgetting-limits-and-compliance-driven-policies</loc>
    <lastmod>2026-03-29T18:00:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-36-encrypt-ai-data-correctly-in-transit-at-rest-and-in-use</loc>
    <lastmod>2026-03-29T17:59:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-35-protect-sensitive-data-with-masking-redaction-and-practical-de-identification</loc>
    <lastmod>2026-03-29T17:45:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-34-understand-watermarking-basics-goals-limits-and-validation-use-cases</loc>
    <lastmod>2026-03-29T17:45:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-33-preserve-integrity-end-to-end-hashing-signing-and-controlled-transformations</loc>
    <lastmod>2026-03-29T17:44:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-32-build-lineage-and-traceability-from-raw-sources-to-model-artifacts</loc>
    <lastmod>2026-03-29T17:44:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-31-apply-data-augmentation-responsibly-without-introducing-backdoors-or-skew</loc>
    <lastmod>2026-03-29T17:44:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-30-use-labeling-safely-quality-controls-annotation-bias-and-poisoning-exposure</loc>
    <lastmod>2026-03-29T17:44:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-29-apply-data-minimization-collect-less-store-less-and-expose-far-less</loc>
    <lastmod>2026-03-29T17:44:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-28-handle-structured-semi-structured-and-unstructured-data-with-safe-controls</loc>
    <lastmod>2026-03-29T17:44:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-27-prevent-training-data-leakage-secrets-pii-and-tokenization-side-effects</loc>
    <lastmod>2026-03-29T17:44:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-26-clean-and-normalize-data-without-losing-security-relevant-signal-and-context</loc>
    <lastmod>2026-03-29T17:43:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-25-secure-data-intake-authenticity-checks-source-trust-and-provenance-tracking</loc>
    <lastmod>2026-03-29T17:43:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-24-manage-model-output-formats-schemas-parsing-and-safe-downstream-handling</loc>
    <lastmod>2026-03-29T17:43:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-23-calibrate-confidence-carefully-when-to-trust-outputs-and-when-to-escalate</loc>
    <lastmod>2026-03-29T17:43:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-22-reduce-hallucinations-practically-grounding-constraints-and-verification-patterns</loc>
    <lastmod>2026-03-29T17:43:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-21-separate-system-developer-and-user-instructions-to-prevent-confused-authority</loc>
    <lastmod>2026-03-29T17:43:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-20-control-tool-use-in-agents-permissions-scope-and-safe-action-boundaries</loc>
    <lastmod>2026-03-29T17:43:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-19-write-prompt-templates-that-reduce-variance-and-prevent-risky-behaviors</loc>
    <lastmod>2026-03-29T17:42:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-18-use-zero-shot-one-shot-and-few-shot-prompting-with-clear-guardrails</loc>
    <lastmod>2026-03-29T17:42:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-17-build-prompt-foundations-roles-instructions-context-and-output-constraints</loc>
    <lastmod>2026-03-29T17:42:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-16-choose-vector-stores-wisely-indexing-latency-recall-and-access-controls</loc>
    <lastmod>2026-03-29T17:42:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-15-design-retrieval-augmented-generation-that-resists-abuse-and-data-spillover</loc>
    <lastmod>2026-03-29T17:33:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-14-understand-embeddings-deeply-similarity-search-semantic-space-and-leakage-risks</loc>
    <lastmod>2026-03-29T17:32:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-13-apply-pruning-and-quantization-without-breaking-security-expectations-and-accuracy</loc>
    <lastmod>2026-03-29T17:32:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-12-fine-tune-safely-epochs-learning-rates-and-catastrophic-forgetting-risks</loc>
    <lastmod>2026-03-29T17:32:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-11-explain-model-lifecycle-states-training-tuning-serving-and-retirement-criteria</loc>
    <lastmod>2026-03-29T17:32:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-10-validate-models-like-a-defender-cross-validation-holdouts-and-drift-awareness</loc>
    <lastmod>2026-03-29T17:32:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-9-spot-overfitting-early-bias-variance-tradeoffs-and-generalization-failure</loc>
    <lastmod>2026-03-29T17:32:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-8-translate-model-metrics-into-risk-precision-recall-f1-roc-and-cost</loc>
    <lastmod>2026-03-29T17:32:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-7-compare-supervised-unsupervised-and-reinforcement-learning-for-security-use-cases</loc>
    <lastmod>2026-03-29T17:31:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-6-understand-transformers-clearly-attention-tokens-context-windows-and-limits</loc>
    <lastmod>2026-03-29T17:31:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-5-explain-statistical-learning-foundations-security-pros-actually-use-on-the-job</loc>
    <lastmod>2026-03-29T17:31:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-4-map-the-ai-landscape-for-security-ml-deep-learning-and-generative-systems</loc>
    <lastmod>2026-03-29T17:31:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-3-lock-in-exam-day-tactics-time-stress-and-scenario-decision-patterns</loc>
    <lastmod>2026-03-29T17:31:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-2-build-a-spoken-study-plan-that-fits-secai-objectives-and-your-calendar</loc>
    <lastmod>2026-03-29T17:31:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/episode-1-decode-the-secai-exam-blueprint-scoring-rules-and-question-mechanics</loc>
    <lastmod>2026-03-29T17:31:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secai.baremetalcyber.com/episodes/welcome-to-certified-the-comptia-secai-audio-course</loc>
    <lastmod>2026-03-29T17:30:51Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
